The Effect of Text Summarization in Essay Scoring (Case Study: Teach on E-Learning)
The development of automated essay scoring (AES) in the neural network (NN) approach has eliminated feature engineering. However, feature engineering is still needed, moreover, data with labels in the form of rubric scores, which are complementary to AES
Sensa Gudya Sauma Syahra +2 more
doaj +1 more source
Reducing the Cost of Implementing AES as a Quantum Circuit
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value.
Brandon Langenberg +2 more
semanticscholar +1 more source
Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables
AES is a symmetric encryption algorithm widely used in many applications. An AES implementation in the data plane can help us build in-network security and privacy applications, such as IP header encryption or onion routing.
Xiaoqi Chen
semanticscholar +1 more source
Acute encephalitis syndrome surveillance, Kushinagar district, Uttar Pradesh, India, 2011-2012 [PDF]
In India, quality surveillance for acute encephalitis syndrome (AES), including laboratory testing, is necessary for understanding the epidemiology and etiology of AES, planning interventions, and developing policy.
Arunachalam +20 more
core +1 more source
The price of tumor control: an analysis of rare side effects of anti-CTLA-4 therapy in metastatic melanoma from the ipilimumab network [PDF]
Background: Ipilimumab, a cytotoxic T-lymphocyte antigen-4 (CTLA-4) blocking antibody, has been approved for the treatment of metastatic melanoma and induces adverse events (AE) in up to 64% of patients.
A Bashey +88 more
core +4 more sources
C sp2/sp3 hybridisations in carbon nanomaterials – XPS and (X)AES study
Shape of the C KLL (KVV) Auger spectrum provides a measure of C sp2/sp3 hybridisations, alternative to C 1s spectra fitting. Due to a smaller kinetic energy of C KLL electrons than C 1s photoelectrons the investigated information depths are attributed to
B. Lesiak +6 more
semanticscholar +1 more source
Secure Framework Enhancing AES Algorithm in Cloud Computing
The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the ...
Ijaz Ahmad Awan +5 more
semanticscholar +1 more source
Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards.
El-Douh Ahmed Abdel-Rahim +3 more
doaj +1 more source
The admission experience survey italian version (I-AES). a factor analytic study on a sample of 156 acute psychiatric in-patients [PDF]
Coercive treatments are often regarded as an inevitable and yet highly debated feature of psychiatric care. Perceived coercion is often reported by patients involuntarily committed as well as their voluntary counterparts. The Admission Experience Survey (
Biondi, Massimo +6 more
core +1 more source
Stacking battery energy storage revenues with enhanced service provision
Battery energy storage systems (BESSs) offer many desirable services from peak demand lopping/valley filling too fast power response services. These services can be scheduled so they enhance each other; in this manner, the inverter size is effectively ...
Paul Vincent Brogan +4 more
doaj +1 more source

